Profile image of Lei Pan

Dr Lei Pan

STAFF PROFILE

Position

Senior Lecturer in Cyber Security

Faculty

Faculty of Sci Eng & Built Env

Department

School of Info Technology

Campus

Melbourne Burwood Campus

Contact

l.pan@deakin.edu.au
+61 3 925 17483

Publications

Filter by

2020

Security test MOODLE: a penetration testing case study

A Mudiyanselage, L Pan

(2020), Vol. 42, pp. 372-382, International journal of computers and applications, Abingdon, Eng., C1

journal article

Generating security questions for better protection of user privacy

A Anvari, L Pan, X Zheng

(2020), Vol. 42, pp. 329-350, International journal of computers and applications, Abingdon, Eng., C1

journal article

Privacy protection in interactive content based image retrieval

Y Huang, J Zhang, L Pan, Y Xiang

(2020), Vol. 17, pp. 595-607, IEEE transactions on dependable and secure computing, Piscataway, N.J., C1

journal article

Code Analysis for Intelligent Cyber Systems: A Data-Driven Approach

Rory Coulter, Qing-Long Han, Lei Pan, Jun Zhang, Yang Xiang

(2020), Vol. 524, pp. 46-58, Information Sciences, Amsterdam, The Netherlands, C1

journal article

High-capacity (2,3) threshold quantum secret sharing based on asymmetric quantum lossy channels

Hong Lai, Josef Pieprzyk, Ming-Xing Luo, Cheng Zhan, Lei Pan, Mehmet Orgun

(2020), Vol. 19, pp. 1-13, Quantum Information Processing, Berlin, Germany, C1

journal article

VoterChoice: A ransomware detection honeypot with multiple voting framework

Chee Ng, Sutharshan Rajasegarar, Lei Pan, Frank Jiang, Yu Zhang

(2020), pp. 1-29, Concurrency and Computation: Practice and Experience, Hoboken, N.J., C1

journal article

Measurement Device Independent Quantum Key Distribution Based on Orbital Angular Momentum under Parametric Light Source

Meng Wang, Hong Lai, Lei Pan

(2020), Vol. 62, pp. 369-387, Computers, Materials and Continua, Encino, Calif., C1

journal article

An efficient voting based decentralized revocation protocol for vehicular ad hoc networks

Miraj Asghar, Lei Pan, Robin Ram Mohan Doss

(2020), pp. 1-18, Digital Communications and Networks, Amsterdam, The Netherlands, C1

journal article

JSCSP: a novel policy-based XSS defense mechanism for browsers

Guangquan Xu, Xiaofei Xie, Shuhan Huang, Jun Zhang, Lei Pan, Wei Lou, Kaitai Liang

(2020), pp. 1-17, IEEE Transactions on Dependable and Secure Computing, Piscataway, N.J., C1

journal article

Trustworthy blockchain?based medical Internet of thing for minimal invasive surgery training simulator

Yonghang Tai, Yinjia Wang, Zhifeng Wang, Feiyan Li, Lei Wei, Lei Pan, Jun Zhang, Junsheng Shi

(2020), Concurrency and Computation: Practice & Experience, C1

journal article

A review of simulators used for VANETs: The case-study of vehicular mobility generators

T Bhatia, R Ketti Ramachandran, R Ram Mohan Doss, L Pan

(2020), SPIN 2020 Proceedings of the 7th International Conference on Signal Processing and Integrated Networks, Noida, India, E1

conference
2019

Noise-resistant statistical traffic classification

B Wang, J Zhang, Z Zhang, L Pan, Y Xiang, D Xia

(2019), pp. 454-466, IEEE transactions on big data, Piscataway, N.J., C1

journal article

Efficient quantum private queries based on quantum key distribution with pulse-position modulation

Hong Lai, Mingxing Luo, Yongjian Xu, Josef Pieprzyk, Lei Pan, Jun Zhang, Mehmet Orgun

(2019), Vol. 29, pp. 1-7, Laser physics, Bristol, Eng., C1

journal article

Predicting the impact of android malicious samples via machine learning

Junyang Qiu, Wei Luo, Lei Pan, Yonghang Tai, Jun Zhang, Yang Xiang

(2019), pp. 1-14, IEEE Access, Piscataway, N.J., C1

journal article

Protean authentication scheme - a time-bound dynamic KeyGen authentication technique for IoT edge nodes in outdoor deployments

Shiju Sathyadevan, K Achuthan, Robin Ram Mohan Doss, Lei Pan

(2019), Vol. 7, pp. 92419-92435, IEEE access, Piscataway, N.J., C1

journal article

Automatic extraction and integration of behavioural indicators of malware for protection of cyber-physical networks

S Huda, J Abawajy, B Al-Rubaie, L Pan, M Hassan

(2019), Vol. 101, pp. 1247-1258, Future generation computer systems, Amsterdam, The Netherlands, C1

journal article

A3CM: automatic capability annotation for android malware

Junyang Qiu, Jun Zhang, Wei Luo, Lei Pan, Surya Nepal, Yu Wang, Yang Xiang

(2019), Vol. 7, pp. 147156-147168, IEEE Access, Piscataway, N.J., C1

journal article

Data-driven cyber security in perspective-intelligent traffic analysis

Rory Coulter, Qing-Long Han, Lei Pan, Jun Zhang, Yang Xiang

(2019), pp. 1-13, IEEE Transactions on Cybernetics, Piscataway, N.J., C1

journal article

Software vulnerability discovery via learning multi-domain knowledge bases

Guanjun Lin, Jun Zhang, Wei Luo, Lei Pan, Olivier De Vel, Paul Montague, Yang Xiang

(2019), pp. 1-17, IEEE transactions on dependable and secure computing, Piscataway, N.J., C1

journal article

A literature review of inter-enterprise SOA in small and medium business communities

A Andriyanto, R Doss, L Pan, P Yustianto

(2019), pp. 547-554, ICITSI 2018 : Proceedings of the 5th International Conference on Information Technology Systems and Innovation, Bandung and Padang, Indonesia, E1

conference

Multiple energy harvesting devices enabled joint computation offloading and dynamic resource allocation for mobile-edge computing systems

Wei Du, Qiwang Lei, Qiang He, Wei Liu, Feifei Chen, Lei Pan, Tao Lei, Hailiang Zhao

(2019), pp. 154-158, ICWS 2019 : Proceedings of the IEEE International Conference on Web Services, Milan, Italy, E1

conference

Cyber security insights into self-proclaimed virtual world hackers

Nicholas Patterson, M Hobbs, F Jiang, L Pan

(2019), pp. 73-87, CSITEC 2019 : Proceedings of the 5th International Conference on Computer Science, Information Technology, Vienna, Austria, E1

conference

A Visualization-Based Analysis on Classifying Android Malware

R Coulter, L Pan, J Zhang, Y Xiang

(2019), Vol. 11806, pp. 304-319, Machine Learning for Cyber Security, Xi'an, China, E1

conference

Data-Driven Android Malware Intelligence: A Survey

J Qiu, S Nepal, W Luo, L Pan, Y Tai, J Zhang, Y Xiang

(2019), Vol. 11806, pp. 183-202, Machine Learning for Cyber Security, Xi?an, China, E1

conference

Attainable hacks on keystore files in ethereum wallets--a systematic analysis

Purathani Praitheeshan, Y Xin, Lei Pan, Robin Ram Mohan Doss

(2019), FNSS 2019 : Future Network Systems and Security, Melbourne, Australia, E1

conference

Password strength estimators trained on the leaked password lists

C Schaffer, Lei Pan

(2019), Vol. 1116, pp. 219-231, ATIS 2019: Applications and Techniques in Information Security, Thanjavur, India, E1

conference

Cloud Forensics Investigations Relationship: A Model And Instrument

Younis Al Husaini, Matthew Warren, Lei Pan, Mansoor Al Gharibi

(2019), pp. 778-788, ACIS 2019 : Security and Privacy : Proceedings of the 30th Australasian Conference on Information Systems, Perth, Western Australia, E1

conference

Domain-adversarial graph neural networks for text classification

Man Wu, Shirui Pan, Xingquan Zhu, Chuan Zhou, Lei Pan

(2019), pp. 648-657, ICDM 2019 : Proceedings of the IEEE International Conference on Data Mining, Beijing, China, E1

conference
2018

Honeypot frameworks and their applications: a new framework

Chee Ng, Lei Pan, Y Xiang

(2018), Singapore, A1

book

Comprehensive analysis of network traffic data

Y Miao, Z Ruan, L Pan, J Zhang, Y Xiang

(2018), Vol. 30, pp. 1-16, Concurrency and computation: practice and experience, Chichester, Eng., C1

journal article

Intelligent agents defending for an IoT world: a review

R Coulter, L Pan

(2018), Vol. 73, pp. 439-458, Computers and security, Amsterdam, The Netherlands, C1

journal article

Cross-project transfer representation learning for vulnerable function discovery

G Lin, J Zhang, W Luo, L Pan, Y Xiang, O De Vel, P Montague

(2018), Vol. 14, pp. 3289-3297, IEEE transactions on industrial informatics, Piscataway, N.J., C1

journal article

Big network traffic data visualization

Z Ruan, Y Miao, L Pan, Y Xiang, J Zhang

(2018), Vol. 77, pp. 11459-11487, Multimedia tools and applications, New York, N.Y., C1

journal article

High-rate and high-capacity measurement-device-independent quantum key distribution with Fibonacci matrix coding in free space

H Lai, M Luo, J Pieprzyk, J Zhang, L Pan, M Orgun

(2018), Vol. 61, pp. 1-11, Science China information sciences, Berlin, Germany, C1

journal article

Identifying items for moderation in a peer assessment framework

S James, E Lanham, V mak, L Pan, T Wilkin, G Wood-bradley

(2018), Vol. 162, pp. 211-219, Knowledge-based systems, Amsterdam, The Netherlands, C1

journal article

A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement

H Lai, M Luo, J Zhang, J Pieprzyk, L Pan, M Orgun

(2018), Vol. 17, pp. 1-11, Quantum information processing, New York, N.Y., C1

journal article

Exploring feature coupling and model coupling for image source identification

Y Huang, L Cao, J Zhang, L Pan, Y Liu

(2018), Vol. 13, pp. 3108-3121, IEEE transactions on information forensics and security, Piscataway, N.J., C1

journal article

Object localisation through clustering unreliable ultrasonic range sensors

L Pan, X Zheng, P Kolar, S Bangay

(2018), Vol. 27, pp. 268-280, International journal of sensor networks, Olney, Eng., C1

journal article

Round-robin-differential-phase-shift quantum key distribution based on wavelength division multiplexing

H Lai, M Luo, Y Xiu, J Pieprzyk, J Zhang, L Pan, M Orgun

(2018), Vol. 15, Laser physics letters, Bristol, Eng., C1

journal article

A quantum secret sharing scheme using orbital angular momentum onto multiple spin states based on Fibonacci compression encoding

H Lai, M Luo, Y Xu, J Pieprzyk, J Zhang, L Pan, M Orgun

(2018), Vol. 70, pp. 384-390, Communications in theoretical physics, Bristol, Eng., C1

journal article

Practical overview of security issues in wireless sensor network applications

H Radhappa, L Pan, J Xi Zheng, S Wen

(2018), Vol. 40, pp. 202-213, International journal of computers and applications, Abingdon, Eng., C1

journal article

Distributed detection of zero-day network traffic flows

Y Miao, L Pan, S Rajasegarar, J Zhang, C Leckie, Y Xiang

(2018), Vol. 845, pp. 173-191, AusDM 2017 : Proceedings of the 15th Australasian Data Mining Conference 2017, Melbourne, Vic., E1

conference

Identifying drawbacks in malicious PDF detectors

A Falah, L Pan, M Abdelrazek, R Doss

(2018), Vol. 878, pp. 128-139, FNSS 2018 : Proceedings of the Future Network Systems and Security Conference 2018, Paris, France, E1

conference

Keep calm and know where to focus: measuring and predicting the impact of Android Malware

J Qiu, W Luo, S Nepal, J Zhang, Y Xiang, L Pan

(2018), Vol. 11323, pp. 238-254, ADMA 2018: Proceedings of the 14th International Conference on Advanced Data Mining and Applications, Nanjing, China, E1

conference

A quantitative approach to design special purpose systems to measure hacking skills

Ahmed Falah, Lei Pan, F Chen

(2018), pp. 54-61, TALE 2018 : Engineering next-generation learning : Proceedings of the 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering, Wollongong, N.S.W., E1

conference

A scalable and efficient PKI based authentication protocol for VANETs

M Asghar, R Doss, L Pan

(2018), pp. 1-3, ITNAC 2018 : Proceedings of the 2018 28th International Telecommunication Networks and Applications Conference, Sydney, N.S.W., E1

conference

Cloud forensics relationship between the law enforcement and cloud service providers

Younis Al Husaini, Matthew Warren, Lei Pan

(2018), pp. 79-88, CWAR 2018 : Proceedings of the 17th Australian Cyber Warfare Conference, Melbourne, Victoria, E1

conference
2017

Fast and simple high-capacity quantum cryptography with error detection

H Lai, M-X Luo, J Pieprzyk, J Zhang, L Pan, S Li, M Orgun

(2017), Vol. 7, pp. 1-11, Scientific reports, London, Eng., C1

journal article

Visualization of big data security - a case study on the KDD99 cup data set

Z Ruan, Y Miao, L Pan, N Patterson, J Zhang

(2017), Vol. 3, pp. 250-259, Digital communications and networks, Amsterdam, The Netherlands, C1

journal article

Cyber security attacks to modern vehicular systems

L Pan, X Zheng, H Chen, H Luan, H Bootwala, L Batten

(2017), Vol. 36, pp. 90-100, Journal of information security and applications, Amsterdam, The Netherlands, C1

journal article

Visual representation of penetration testing actions and skills in a technical tree model

A Falah, L Pan, M Abdelrazek

(2017), pp. 1-10, ACSW 2017 : Proceedings of the Australasian Computer Science Week Multiconference, Geelong, Vic., E1

conference

Security analysis of modern mission critical android mobile applications

X zheng, L Pan, E Yilmaz

(2017), pp. 1-9, ACSW 2017 : Proceedings of the Australasian Computer Science Week Multiconference, Geelong, Victoria, E1

conference

Comprehensive analysis of network traffic data

Y Miao, Z ruan, L Pan, J Zhang, Y Xiang, Y Wang

(2017), pp. 423-430, CIT 2016 : Proceedings of the IEEE International Conference on Computer and Information Technology, Nadi, Fiji, E1

conference

Portguard - An authentication tool for securing ports in an IoT gateway

S Sathyadevan, V Vejesh, R Doss, L Pan

(2017), pp. 624-629, PerCom 2017 : IEEE International Conference on Pervasive Computing and Communications Workshops, Kona, Hawaii, E1

conference

Online peer marking with aggregation functions

S James, L Pan, T Wilkin, L Yin

(2017), pp. 1-6, FUZZ-IEEE 2017 : IEEE International Conference on Fuzzy Systems, Naples, Italy, E1

conference

A testbed for security analysis of modern vehicle systems

X Zheng, L Pan, H Chen, R Di Pietro, L Batten

(2017), pp. 1090-1095, trustcom/BigDataSE/ICESS 2017 : Proceedings of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Sydney, N.S.W., E1

conference
2016

Hybrid threshold adaptable quantum secret sharing scheme with reverse Huffman-Fibonacci-tree coding

H Lai, J Zhang, M-X Luo, L Pan, J Pieprzyk, F Xiao, M Orgun

(2016), Vol. 6, pp. 1-12, Scientific reports, London, Eng., C1

journal article

Investigating security vulnerabilities in modern vehicle systems

X Zheng, L Pan, H Chen, P Wang

(2016), Vol. 651, pp. 29-40, ATIS 2016 : Proceedings of the International Conference on Applications and Techniques in Information Security, Cairns, Queensland, E1

conference

Robustness and embedding capacity enhancement in time-spread echo-based audio watermarking

I Natgunanathan, Y Xiang, L Pan, P Chen, D Peng

(2016), pp. 1536-1541, ICIEA 2016: Proceedings of the IEEE 11th Conference on Industrial Electronics and Applications, Hefei, China, E1

conference
2015

The usefulness metrics of the most popular eReader used by higher education students

D Sari, E Lanham, L Pan

(2015), Vol. 12, pp. 203-212, Issues in informing science and information technology, Santa Rosa, Cailf., C1

journal article

Segregation-of-duties conflicts in the insider threat landscape: an overview and case study

S Ballesteros, L Pan, L Batten, G Li

(2015), pp. 367-370, ERMM 2015: Proceedings of the 2015 International Conference on Education Reform and Modern Management, Hong Kong, E1

conference

Enhanced Twitter sentiment analysis by using feature selection and combination

A Yang, J Zhang, L Pan, Y Xiang

(2015), pp. 52-57, SOCIALSEC 2015: Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, Hangzhou, China, E1

conference
2014

A novel method for detecting double compressed Facebook JPEG images

C Ng, L Pan, Y Xiang

(2014), Vol. 490, pp. 191-198, Communications in Computer and Information Science, Dordrecht , Germany, B1

book chapter

Privacy preserving in location data release: A differential privacy approach

P Xiong, T Zhu, L Pan, W Niu, G Li

(2014), Vol. 8862, pp. 183-195, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), B1

book chapter

Forensic identification of students outsourcing assignment projects from freelancer.com

M Monnik, L Pan

(2014), Vol. 490, pp. 183-190, Communications in Computer and Information Science, Berlin, Germany, B1

book chapter

Investigating Facebook groups through a random graph model

D Pallegedara, L Pan

(2014), Vol. 9, pp. 25-34, Journal of multimedia, Finland, C1

journal article

Privacy preserving collaborative filtering for KNN attack resisting

T Zhu, G Li, L Pan, Y Ren, W Zhou

(2014), Vol. 4, pp. 1-14, Social network analysis and mining, Berlin, Germany, C1-1

journal article

Applications and techniques in information security

L Batten, G Li, W Niu, M Warren

(2014), Vol. 490, pp. III-IV, Communications in Computer and Information Science, A7

edited book

Generating repudiable, memorizable and privacy preserving security questions using the Propp Theory of Narrative

L Pan, S Bangay

(2014), pp. 66-72, CyberC 2014 : The 6th International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, Shanghai, China, E1

conference
2013

Developing a cloud computing based approach for forensic analysis using OCR

M Trojahn, L Pan, F Schmidt

(2013), pp. 59-68, Proceedings - 7th International Conference on IT Security Incident Management and IT Forensics, IMF 2013, E1

conference

Developing an empirical algorithm for protecting text-based captchas against segmentation attacks

L Pan, Y Zhou

(2013), pp. 636-643, Proceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013, E1

conference
2012

Hypothesis generation and testing in event profiling for digital forensic investigations

L Batten, L Pan, N Khan

(2012), Vol. 4, pp. 1-14, International Journal of Digital Crime and Forensics, C1

journal article

Using hypothesis generation in event profiling for digital forensic investigations

L Pan, N Khan, L Batten

(2012), pp. 76-86, WDFIA 2012 : Proceedings of the Seventh International Workshop on Digital Forensics & Incident Analysis:, Crete, Greece, E1

conference

Detecting SMS-based control commands in a Botnet from infected android devices

A Nguyen, L Pan

(2012), pp. 23-27, ATIS 2012 : Proceedings of the 3rd Applications and Technologies in Information Security Workshop, Melbourne, Vic., E1

conference

Towards a sustainable assessment strategy for digital forensic education and training

L Pan, D Hutchinson, N Khan

(2012), Proceedings of IEEE International Conference on Teaching, Assessment, and Learning for Engineering, TALE 2012, E1

conference
2011

A Grobner-Shirshov algorithm for applications in internet security

A Kelarev, J Yearwood, P Watters, X Wu, L Ma, J Abawajy, L Pan

(2011), Vol. 35, pp. 807-820, Southeast Asian bulletin of mathematics, Hong Kong, C1

journal article

Using relationship-building in event profiling for digital forensic investigations

L Batten, L Pan

(2011), Vol. 56, pp. 40-52, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, E1

conference

Image source detection : a case study on Facebook images taken by iPhones

L Pan, N Trepanic

(2011), pp. 39-46, ATIS 2011 : Workshop proceedingof ATIS 2011. Melbourne, November 9th, 2011. Second Applications and Techniques in Information Security Workshop, Melbourne, Vic., E1

conference
2010

Internet security applications of the Munn rings

A Kelarev, J Yearwood, P Watters, X Wu, J Abawajy, L Pan

(2010), Vol. 81, pp. 162-171, Semigroup Forum, C1

journal article

Dynamic addressing in wireless sensor networks Without location awareness

R Doss, D Chandra, L Pan, W Zhou, M Chowdhury

(2010), Vol. 26, pp. 443-460, Journal of Information Science and Engineering, C1

journal article
2009

Robust performance testing for digital forensic tools

L Pan, L Batten

(2009), Vol. 6, pp. 71-81, Digital Investigation, C1

journal article

Robust correctness testing for digital forensic tools

L Pan, L Batten

(2009), Vol. 8 LNICST, pp. 54-64, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, E1

conference
2008

Teaching digital forensics to undergraduate students

L Batten, L Pan

(2008), Vol. 6, pp. 54-56, IEEE Security and Privacy, C1

journal article

Measure of integrity leakage in live forensic context

L Pan, A Savoldi, P Gubian, L Batten

(2008), pp. 534-537, IIH-MSP 2008 : Proceedings of the Intelligent Information Hiding and Multimedia Signal Processing 2008 international conference, Harbin, China, E1-1

conference
2007

A lower bound on effective performance testing for digital forensic tools

L Pan, L Batten

(2007), pp. 117-130, Proceedings - SADFE 2007: Second International Workshop on Systematic Approaches to Digital Forensic Engineering, E1

conference

An effective and efficient testing methodology for correctness testing for file recovery tools

L Pan, L Batten

(2007), Vol. 2, pp. 103-107, Proceedings - 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2007., E1

conference
2006

Lease based addressing for event-driven wireless sensor networks

R Doss, D Chandra, L Pan, W Zhou, M Chowdhury

(2006), pp. 251-256, Proceedings - International Symposium on Computers and Communications, E1

conference

Address reuse in wireless sensor networks

R Chellappa Doss, D Chandra, L Pan, W Zhou, M Chowdhury

(2006), pp. 329-333, ATNAC, Australian Telecommuncation Networks and Applications Conference, 2006., Melbourne, Australia, E1

conference

A case for cross layer design: the impact of physical layer properties on routing protocol performance in MANETs

R Doss, L Pan

(2006), pp. 409-413, ATNAC, Australian Telecommuncation Networks and Applications Conference, 2006., Melbourne, Australia, E1

conference
2005

Reproducibility of digital evidence in forensic investigations

L Pan, L Batten

(2005), Digital Forensic Research Workshop 2005, E1

conference

Funded Projects at Deakin

Other Public Sector Funding

Cyber-Safe Connected Vehicles: Ensuring Secure, Trusted, and Robust Cooperative Automotive systems.

Prof Robin Ram Mohan Doss, Prof Seng Loke, Dr Lei Pan, Dr Rolando Trujillo Rasua, Dr Frank Jiang, Dr Leo Zhang

  • 2019: $296,940

Industry and Other Funding

Implementation of transaction privacy protocols on Distributed Ledger systems.

Dr Lei Pan

  • 2019: $14,500

Supervisions

Principal Supervisor
2020

Ahmed Falah

Thesis entitled: Improving PDF Maldoc Detection via Data-Driven Feature Engineering

Doctor of Philosophy (Information Technology), School of Information Technology

2019

Chee Keong (Allan) Ng

Thesis entitled: VoterChoice: A Ransomware Detection Honeypot with Multiple Voting Concept

Doctor of Philosophy (Information Technology), School of Information Technology

Associate Supervisor
2020

Agustinus Andriyanto

Thesis entitled: Service-based Reference Architecture in the Context of Inter-Enterprise Architecture

Doctor of Philosophy (Information Technology), School of Information Technology

2019

Russul Dh. Abdul Jabar Al-Anni

Thesis entitled: Cancer Prognosis Based on Knowledge Discovery from Clinic and Biological Data Sets

Doctor of Philosophy (Information Technology), School of Information Technology

2018

Ahmed Abdulateef Mohammed

Thesis entitled: Robust Approaches for Face Recognition

Doctor of Philosophy (Information Technology), School of Information Technology

Purnomo Yustianto

Thesis entitled: General Framework for Service Engineering Analysis and Design

Doctor of Philosophy (Information Technology), School of Information Technology

2014

Moutaz Alazab

Thesis entitled: Analysis on Smartphone Devices for Detection and Prevention of Malware

Doctor of Philosophy (Information Technology), School of Information Technology